Mobile Security

Mobile security news, trends, analysis and practical advice

iot security
thieving magpie

fingerprint

Feds: It's legal to demand fingerprints to unlock phones of everyone in a building

Federal prosecutors wanted cops to collect fingerprints and thumbprints of everyone in a building to unlock all smartphones at that location.

glass office cloud

Business transformation proves to be catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

biometrics fingerscan smartphone

Chase Mobile grasps the obvious about biometrics

On Monday, Chase quietly stopped asking for passwords for sensitive transfers on its mobile app, concluding that a fingerprint-scan is quite sufficient.

security light

20% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert

Night or day, Kuna’s smart outdoor security camera system detects movement at your door and sends actionable alerts to your mobile device, allowing you to safely take action using Kuna’s lights, HD live video feed, two-way intercom,...

samsung note7 iris setup

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

150817 google marshmallow 06

Qualcomm-powered Android devices plagued by four rooting flaws

Hundreds of millions of Android devices based on Qualcomm chipsets are likely exposed to at least one of four critical vulnerabilities that allow non-privileged apps to take them over.

internet of things smart house

Your router won’t protect you when smartphones attack smart homes

Your home router, or firewall, won't protect you when smartphones attack smart homes.

Talent Acquisition Methods

Antivirus merger: Avast to buy AVG for $1.3 billion

Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for $1.3 billion in cash.

Sundar Pichai

Google’s Sundar Pichai has been hacked; which CEO will be next?

Google CEO Sundar Pichai has become the latest tech executive to have a social media account hacked.

4 mastercard

MasterCard joins Visa in streamlining chip card processing

MasterCard announced plans similar to those made last week by Visa to speed up chip card in-store terminal testing and certification.

broken link breaching weakest link connection vulnerability 000004213740

AT&T and Samsung detail security gaps

In a global online survey of 800 enterprises conducted by IDC for AT&T, 60% said they had a security breach in 2015. Of that group, 42% said the breach had a significant negative impact on the business.

biometrics

Forget fingerprints; Iris scans could validate mobile payments

Newer biometrics technologies beyond the use of fingerprint scans could boost adoption rates for mobile payments.

school food chicken nuggets tray lunch school lunch food 000000723036

Hackers are ready to eat your app for LUNCH

These are some classic characteristics and traits of development teams that can signal trouble when it comes to building highly secure applications and services.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

Load More